General
-
Target
Umbral.exe
-
Size
229KB
-
Sample
250109-yns7bayrd1
-
MD5
5ef325936584fbe65e97c89d5787b22b
-
SHA1
fbe3db5453a683a05c140de6a48169c683ffdb68
-
SHA256
b40b8ae2d3083f53ce18753b29592ba542865938295c4d656ecc649c6038d57b
-
SHA512
62db38a9449a7e6bdb0fe26228df1a2a8c9f62a05a28aff043b0e40e0eb2ae91ffc7d765b9fcfd74e981e413ab732f54545fb40ffe7ff0904993ba61fa4c00ad
-
SSDEEP
6144:lloZM+rIkd8g+EtXHkv/iD4AiblAmB5K9/Cwhl0B9b8e1mJi:noZtL+EP8AiblAmB5K9/Cwhl0z3
Behavioral task
behavioral1
Sample
Umbral.exe
Resource
win7-20240903-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1327001236427374632/7Pk6g0WQ6MwIEJIF_o_6hmjyc7skzfyqSA-CeUJAscxgUazxLOxY6BmLBp_NipL3KOiW
Targets
-
-
Target
Umbral.exe
-
Size
229KB
-
MD5
5ef325936584fbe65e97c89d5787b22b
-
SHA1
fbe3db5453a683a05c140de6a48169c683ffdb68
-
SHA256
b40b8ae2d3083f53ce18753b29592ba542865938295c4d656ecc649c6038d57b
-
SHA512
62db38a9449a7e6bdb0fe26228df1a2a8c9f62a05a28aff043b0e40e0eb2ae91ffc7d765b9fcfd74e981e413ab732f54545fb40ffe7ff0904993ba61fa4c00ad
-
SSDEEP
6144:lloZM+rIkd8g+EtXHkv/iD4AiblAmB5K9/Cwhl0B9b8e1mJi:noZtL+EP8AiblAmB5K9/Cwhl0z3
-
Detect Umbral payload
-
Umbral family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Deletes itself
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1